Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Steganographic method of unsupported text based on linguistic steganographic feature space

A feature space, carrier-free technology, applied in the field of text information hiding, can solve the problems of poor versatility and small hiding capacity, and achieve the effect of large steganographic capacity, good concealment, and strong robustness

Active Publication Date: 2022-03-18
QINGDAO UNIV
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problems of poor versatility and small hidden capacity in the above-mentioned text steganography methods, the present invention provides a carrierless text steganography method based on language steganography feature space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Steganographic method of unsupported text based on linguistic steganographic feature space
  • Steganographic method of unsupported text based on linguistic steganographic feature space
  • Steganographic method of unsupported text based on linguistic steganographic feature space

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] This specific implementation is based on Chinese characters, and only three different features are selected as examples for illustration, which are the number of strokes, the tone of the pinyin, and the structure of Chinese characters.

[0046] Here we define the simplest mapping relationship between the key and the sharing between the two parties, that is, the method of adopting fixed rules when there is no key or a fixed key is agreed. The specific rules are: the preprocessing method of the secret message S is to convert the text into the corresponding Unicode The method of binary representation of the code; the segmentation rule of the binary string is simply specified as: segment according to the longest number of digits that can be represented by the meta tree; the generation method of the text sequence T used to carry the secret message in the text: sequential selection in the text For the text that appears, if the length of the text is less than the number of segm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A carrierless text steganography method based on language steganographic feature space, constructing a steganographic feature space and a meta tree set based on one or more language steganographic features, establishing a mapping relationship based on a key, and determining Convert the secret message into a binary string according to the rules and then segment it, select text arbitrarily and generate a text sequence with the same length as the binary string of the secret message, sequentially put the binary substring and the corresponding elements in the text sequence in the meta tree set Find the corresponding meta-tree by matching on the above, construct these meta-trees into a steganographic tree, and send the steganographic tree identifier and carrier text to the receiver after obtaining the steganographic tree identifier. On the same language steganographic feature space and meta-tree set, the receiver splits the steganographic tree into meta-tree sequences, and then matches these meta-tree sequences with the corresponding elements in the text sequence generated based on the carrier text to obtain the secret message Corresponding to the binary fragment, and then get the secret message. The method has higher concealment and larger hiding capacity.

Description

technical field [0001] The invention relates to a carrierless text steganography method based on language steganography feature space, which belongs to the field of text information hiding. Background technique [0002] The ever-increasing mass of information on the World Wide Web has greatly facilitated people's lives. At the same time, various information leakage and information hijacking problems are emerging one after another, which has caused many major losses. Therefore, people pay more and more attention to information security issues, which accelerates the development of information hiding. As the most widely used medium in network communication and daily life, text is not as widely used in the field of information hiding as image, video and audio. This is mainly due to less redundant information in the text, small hidden capacity and high difficulty. At present, text information hiding is mainly divided into two methods: modified carrier and no carrier. Text-bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0428
Inventor 王开西邹孜逸
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products